System, method, apparatus and computer program product for facilitating digital communications
First Claim
1. A computer-implemented method for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
- storing a client policy on said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
receiving a request from a user for access to said computer;
verifying that the remote computer conforms with said client policy; and
connecting said client to said computer.
9 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.
-
Citations
37 Claims
-
1. A computer-implemented method for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
storing a client policy on said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
receiving a request from a user for access to said computer;
verifying that the remote computer conforms with said client policy; and
connecting said client to said computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
storing at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
receiving a request from a user for access to said computer;
determining a location type of said remote computer;
selecting a desired policy from among said at least one client policy based on said location type of said remote computer;
selecting a connection type from available connections to said computer based on said desired policy;
verifying that said remote computer conforms with said desired policy; and
connecting said client to said computer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
transmitting a client policy to said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
receiving a list of policy violations from said remote computer; and
modifying access rights of a user operating said remote computer. - View Dependent Claims (19)
-
-
20. A computer program product including a computer storage medium and a computer program code mechanism embedded in the computer storage medium for preventing unsecured access to a computer over a network by a client running on a remote computer, the computer code mechanism comprising:
-
a computer code device configured to store a client policy on said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
a computer code device configured to receive a request from a user for access to said computer;
a computer code device configured to verify that the remote computer conforms with said client policy; and
a computer code device configured to connect said client to said computer.
-
-
21. A computer program product including a computer storage medium and a computer program code mechanism embedded in the computer storage medium for preventing unsecured access to a computer over a network by a client running on a remote computer, the computer code mechanism comprising:
-
a computer code device configured to store at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
a computer code device configured to receive a request from a user for access to said computer;
a computer code device configured to determine a location type of said remote computer;
a computer code device configured to select a desired policy from among said at least one client policy based on said location type of said remote computer;
a computer code device configured to select a connection type from available connections to said computer based on said desired policy;
a computer code device configured to verify that said remote computer conforms with said desired policy; and
a computer code device configured to connect said client to said computer.
-
-
22. A computer program product including a computer storage medium and a computer program code mechanism embedded in the computer storage medium for preventing unsecured access to a computer over a network by a client running on a remote computer, the computer code mechanism comprising:
-
a computer code device configured to transmit a client policy to said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
a computer code device configured to receive a list of policy violations from said remote computer; and
a computer code device configured to modify access rights of a user operating said remote computer.
-
-
23. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
means for storing a client policy on said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
means for receiving a request from a user for access to said computer;
means for verifying that the remote computer conforms with said client policy; and
means for connecting said client to said computer.
-
-
24. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
means for storing at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
means for receiving a request from a user for access to said computer;
means for determining a location type of said remote computer;
means for selecting a desired policy from among said at least one client policy based on said location type of said remote computer;
means for selecting a connection type from available connections to said computer based on said desired policy;
means for verifying that said remote computer conforms with said desired policy; and
means for connecting said client to said computer.
-
-
25. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
means for transmitting a client policy to said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
means for receiving a list of policy violations from said remote computer;
means for modifying access rights of a user operating said remote computer.
-
-
26. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
a storage mechanism configured to store a client policy on said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
an input/output device configured to receive a request from a user for access to said computer; and
a processor including a verification mechanism configured to verify that the remote computer conforms with said client policy, wherein said input/output device is configured to connect said client to said computer. - View Dependent Claims (27, 28, 29, 30)
-
-
31. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
a storage mechanism configured to store at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
an input/output device configured to receive a request from a user for access to said computer; and
a processor including;
a location determination mechanism configured to determine a location type of said remote computer;
a policy selection mechanism configured to select a desired policy from among said at least one client policy based on said location type of said remote computer;
a connection selection mechanism configured to select a connection type from available connections to said computer based on said desired policy; and
a verification mechanism configured to verify that said remote computer conforms with said desired policy, wherein said input/output device is configured to connect said client to said computer. - View Dependent Claims (32, 33, 34, 35)
-
-
36. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
an input/output device configured to transmit a client policy to said remote computer, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer, said input/output device configured to receive a list of policy violations from said remote computer; and
a processor including an access control mechanism configured to modify access rights of a user operating said remote computer. - View Dependent Claims (37)
-
Specification